Analysis
-
max time kernel
18s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29-11-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
b16c7105839661a54df694da8c1a630c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b16c7105839661a54df694da8c1a630c_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b16c7105839661a54df694da8c1a630c_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b16c7105839661a54df694da8c1a630c_JaffaCakes118.apk
-
Size
216KB
-
MD5
b16c7105839661a54df694da8c1a630c
-
SHA1
632305209530a7ee156c78019c593fda4d237d4a
-
SHA256
f15c84ffa9218b9785794ce2db01fb05a0e4968767d9aa6af0d530970e1477e4
-
SHA512
f75d49c06cb0221736b29ed355d86241b83cf5b9baea9495129906eff0562b923bfb74770ab1002c69dc2731b207593042e21f78eae997fad81afa9d22900f93
-
SSDEEP
3072:AIlbZAam/xwWaMaPC5+kAMEJGoRLG2Yv/7pcmds+qTyGZ3E9WA:AiZAamZwWaMlfFo1NOcmdsF3qWA
Malware Config
Signatures
-
Queries information about active data network 1 TTPs 1 IoCs
Processes:
srcdsnms.jlimwddescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo srcdsnms.jlimwd -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
srcdsnms.jlimwddescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone srcdsnms.jlimwd -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
srcdsnms.jlimwddescription ioc Process Framework service call android.app.IActivityManager.registerReceiver srcdsnms.jlimwd -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
srcdsnms.jlimwddescription ioc Process Framework API call javax.crypto.Cipher.doFinal srcdsnms.jlimwd -
Checks CPU information 2 TTPs 1 IoCs
Processes:
srcdsnms.jlimwddescription ioc Process File opened for read /proc/cpuinfo srcdsnms.jlimwd -
Checks memory information 2 TTPs 1 IoCs
Processes:
srcdsnms.jlimwddescription ioc Process File opened for read /proc/meminfo srcdsnms.jlimwd
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5b7ef8d8dd0fa0694909ccbaa94d226ca
SHA19d6b01523c5149ecaf096983b25f16395fc4a991
SHA256dc171484c642ba4327e01355281548ff600d8e87ed5d5d0c256260518efc9a0e
SHA512676ea2bbc7e360d1d18d848ebb8f83b0b18d40a27bdc55f2f6f62d53545b1d96f650738fe534b15877f365063e3b12c3fa54ac74944d815c5501eb15ef409d72
-
Filesize
128B
MD54d5f6fe8314d57fe7055c17a8d36b459
SHA119322a871b01ab7c572c1d150ca6049a36cfef55
SHA256c0d633da15d44eb67f970cd4ac1488f324fd805c08919cf62f48cf37fbcca2e5
SHA512aa98deed035e6de51d83bb8844a5ca90dc50f33cfb2938e806126439cfc2e80cb193cf42e62bb7f9f65b24076d051715115169ddaaec052795a39ed7708bad80
-
Filesize
192B
MD5936a5fc09ac1831c217b69cf8141e30a
SHA14509eb427d014ce953744f371b710dceb22b7270
SHA256f796a1620e45c767a4937085b2384fbd9b2511e45b241e3c404636f7f9cb6928
SHA512539d7dd49ac37b0fb21dcb455ec18a67eaea7d18cebda837210b00e0b1ba7a9465f0b7f716cfdc8305726acc8a63f8ddf111a82d85b44492e4d7665c5c46ec3a
-
Filesize
256B
MD596486291bf6f1bc053ae7db14057dad0
SHA11d60671cd4553c06649472f3858b2aae05e80757
SHA256f892acf687f7997048df7bb4ad7c4efcaa0c75606b6b8a67f3f6e89d30bd2c73
SHA5122fbb54f72740ec8037d31bfdad22f0b92429644b68a1a0010d869e53b4079fe6e1618f7bfc5ff533c637af51300b2bacadc626c5d4bbb3b4835cd2f0e0a337a0